A planned series of actions in a corporation is a(n) ________.

A. sequence
B. anomaly
C. process
D. strategy


C. process

Computer Science & Information Technology

You might also like to view...

Kyra is learning about e-mail security for a test she has tomorrow on Internet security. Answer these three questions from the sample quiz. All of the following can be considered spam, EXCEPT _____.

A. e-mails about medical products B. e-mails about antivirus software C. e-mails from sources you subscribed to D. e-mails about sales initiatives

Computer Science & Information Technology

Which of the following is true about the factors that should be considered when evaluating database business requirements and the associated risk assessments?

A. mission-critical systems provide administrators with a large time window for performing maintenance B. databases that have a high change rate require more frequent backups C. for best performance, backups should be done when the system is under peak load D. a single large database is usually easier to maintain than several smaller databases

Computer Science & Information Technology

Software-generated interrupts in the IA-32 architecture can be used to ________.

a) indicate errors occurring in hardware b) perform system calls c) indicate an I/O completion d) none of the above

Computer Science & Information Technology

A(n) ________ is a mail merge file that contains organized data necessary to merge within a document for mailing purposes

Fill in the blank(s) with correct word

Computer Science & Information Technology